A Framework for Policy Inconsistency Detection in Software-Defined Networks

被引:3
|
作者
Lee, Seungsoo [1 ]
Woo, Seungwon [2 ]
Kim, Jinwoo [3 ]
Nam, Jaehyun [4 ]
Yegneswaran, Vinod [5 ]
Porras, Phillip [5 ]
Shin, Seungwon [3 ]
机构
[1] Incheon Natl Univ, Incheon 22012, South Korea
[2] Elect & Telecommun Res Inst ETRI, Daejeon 34129, South Korea
[3] Korea Adv Inst Sci & Technol KAIST, Daejeon 34141, South Korea
[4] AccuKnox, Cupertino, CA 95014 USA
[5] SRI Int, Menlo Pk, CA 94025 USA
关键词
Switches; Control systems; Security; Protocols; IEEE transactions; Databases; Telecommunication network reliability; SDN; software-defined networking; network policy inconsistency;
D O I
10.1109/TNET.2022.3140824
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Software-Defined Networking (SDN) has aggressively grown in data center networks, telecommunication providers, and enterprises by virtue of its programmable and extensible control plane. Also, there have been many kinds of research on the security of SDN components along with the growth of SDN. Some of them have inspected network policy inconsistency problems that can severely cause network reliability and security issues in SDN. However, they do not consider whether a single network policy itself is corrupted during processing inside and between SDN components. In this paper, we thus focus on the question of how to automatically identify cases in which the SDN stack fails to prevent policy inconsistencies from arising among those components. We then present AudiSDN, an automated fuzz-testing framework designed to formulate test cases in which policy inconsistencies can arise in OpenFlow networks, the most prevalent SDN protocol. To prove its feasibility, we applied AudiSDN to two widely used SDN controllers, Floodlight and ONOS, and uncovered three separate CVEs (Common Vulnerabilities and Exposures) that cause the network policy inconsistencies among SDN components. Furthermore, we investigate the design flaws that cause the inconsistencies in modern SDN components, suggesting specific validations to address such a serious but understudied pragmatic concern.
引用
收藏
页码:1410 / 1423
页数:14
相关论文
共 50 条
  • [31] On the Fingerprinting of Software-Defined Networks
    Cui, Heng
    Karame, Ghassan O.
    Klaedtke, Felix
    Bifulco, Roberto
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) : 2160 - 2173
  • [32] On the Security of Software-Defined Networks
    Prasad, Abhinandan S.
    Koll, David
    Fu, Xiaoming
    [J]. 2015 FOURTH EUROPEAN WORKSHOP ON SOFTWARE DEFINED NETWORKS - EWSDN 2015, 2015, : 105 - 106
  • [33] Fingerprinting Software-defined Networks
    Bifulco, Roberto
    Cui, Heng
    Karame, Ghassan O.
    Klaedtke, Felix
    [J]. 2015 IEEE 23RD INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2015, : 453 - 459
  • [34] Software-Defined Access Networks
    Kerpez, Kenneth J.
    Cioffi, John M.
    Ginis, George
    Goldburg, Marc
    Galli, Stefano
    Silverman, Peter
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (09) : 152 - 159
  • [35] Future Scenarios for Software-Defined Metro and Access Networks and Software-Defined Photonics
    Muciaccia, Tommaso
    Passaro, Vittorio M. N.
    [J]. PHOTONICS, 2017, 4 (01)
  • [36] A Multi-Modal Deep Transfer Learning Framework for Attack Detection in Software-Defined Networks
    Elubeyd, Hani
    Yiltas-Kaplan, Derya
    Bahtiyar, Serif
    [J]. IEEE ACCESS, 2023, 11 : 114128 - 114145
  • [37] Programmable Networks-From Software-Defined Radio to Software-Defined Networking
    Macedo, Daniel F.
    Guedes, Dorgival
    Vieira, Luiz F. M.
    Vieira, Marcos A. M.
    Nogueira, Michele
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (02): : 1102 - 1125
  • [38] Detection and Prevention of DoS attacks in Software-Defined Cloud Networks
    Rengaraju, Perumalraja
    Ramanan, Raja, V
    Lung, Chung-Horng
    [J]. 2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, 2017, : 217 - 223
  • [39] A Survey of Link Failure Detection and Recovery in Software-Defined Networks
    Alhiyari, Suheib
    Hamid, Siti Hafizah A.B.
    Daud, Nur Nasuha
    [J]. Computers, Materials and Continua, 2025, 82 (01): : 103 - 137
  • [40] Suspicious traffic sampling for intrusion detection in software-defined networks
    Ha, Taejin
    Kim, Sunghwan
    An, Namwon
    Narantuya, Jargalsaikhan
    Jeong, Chiwook
    Kim, JongWon
    Lim, Hyuk
    [J]. COMPUTER NETWORKS, 2016, 109 : 172 - 182